Toward a Framework for Internet Forensic Analysis
نویسندگان
چکیده
The world of network security is an arms race where attackers constantly change the signatures of their attacks to avoid detection. Aiding the white-hats in this race is one fundamental invariant across all network attacks (present and future): for the attack to progress there must be communication among attacker, the associated set of compromised hosts and the victim(s), and this communication is visible to the network. We argue that the Internet architecture should be extended to include auditing mechanisms that enable the forensic analysis of network data, with a goal of identifying the true originator of each attack — even if the attacker recruits innocent hosts as zombies or stepping stones to propagate the attack. In this paper we outline an approach to the problem of Attacker Identification and Attack Reconstruction, describe the challenges involved, and explain our efforts that show the promise of this approach.
منابع مشابه
A Survey about Network Forensics Tools
This paper gives an overview about the main tools and techniques available to ensure forensic investigations of network security attacks. Given that Web and Email services are the most common used network communication schemes, we mainly focus on the forensic investigation of Email and Web services attacks. Moreover, we present a set of forensics tools used for network traffic capture such as S...
متن کاملIntroduction of a Framework for Customer Orientation Using Ambulant E-Banking Services Marketing (Case Study: Mellat Bank in Isfahan)
E-banking (electronic banking) is the modified business banking toward E-business (electronic business) banking that actually uses the electronic communication channels such as internet, phones, cell phones and the like. By using this method, the demands of customers such as time independent and high flexible actions are satisfied. In this process, marketing is so important because guiding cust...
متن کاملInternet Forensics Framework Based-on Clustering
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation pro...
متن کاملIntroduction of a Framework for Customer Orientation Using Ambulant E-Banking Services Marketing (Case Study: Mellat Bank in Isfahan)
E-banking (electronic banking) is the modified business banking toward E-business (electronic business) banking that actually uses the electronic communication channels such as internet, phones, cell phones and the like. By using this method, the demands of customers such as time independent and high flexible actions are satisfied. In this process, marketing is so important because guiding cust...
متن کاملForensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today’s internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose a new framew...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004